McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Extended Learning Module H Computer Crime and Digital Forensics Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Topic 4: Protecting People & Information Ethics, Privacy & Security MGMD 233-MIS AMN 2012.
Computer Threats I can understand computer threats and how to protect myself from these threats.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
BUSINESS PLUG-IN B6 Information Security.
McGraw-Hill/Irwin ©2005 The McGraw-Hill Companies, All rights reserved Extended Learning Module H COMPUTER CRIME AND FORENSICS.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Extended Learning Module H Computer Crime and Digital Forensics Copyright © 2010 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Extended Learning Module H COMPUTER CRIME AND DIGITAL.
H-1 Management Information Systems for the Information Age Copyright 2004 The McGraw-Hill Companies, Inc. All rights reserved Extended Learning Module.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Quiz Review.
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Chapter Nine Maintaining a Computer Part III: Malware.
ETHICAL HACKING ETHICAL HACKING A LICENCE TO HACK Submitted By: Usha Kalkal M.Tech(1 st Sem) Information technology.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Securing Information Systems
Protecting People and Information: Threats and Safeguards
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Computer Crime and Information Technology Security
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Viruses & Destructive Programs
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Computer Viruses.
CHAPTER 8 PROTECTING PEOPLE AND INFORMATION Threats and Safeguards.
Next Back MAP MAP B-1 Management Information Systems for the Information Age Second Canadian Edition Copyright 2004 The McGraw-Hill Companies, Inc. All.
Chapter 4 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Ethical Hacking and Network Defense NCTT Winter Workshop January 11, 2006.
We are here to help you… Fight something like this Brownies !
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Ethical Hacking and Network Defense. Contact Information Sam Bowne Sam Bowne Website: samsclass.info Website:
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
Securing Information Systems
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Elaine Munn Introduction to Computer Security.
Malware, Phishing and Network Policies
Presentation transcript:

McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics

Mod H-2 INTRODUCTION  Computers are involved in crime in two ways  As the targets of misdeeds  As weapons or tools of misdeeds  Computer crimes can be committed  Inside the organization  Outside the organization

Mod H-3 Examples of Computer Crimes

Mod H-4 Outside the Organization  Malware – software designed to harm your computer or computer security  Virus – software that is written with malicious intent to cause annoyance or damage  Worm – a computer virus that spreads itself from computer to computer via and other Internet traffic

Mod H-5 Other Types of Malware  Spoofing  Trojan Horse  Keylogger (key trapper) software – a program that, when installed on your computer, records every keystroke and mouse click  Misleading  Denial-of-service attacks  Rootkit  Web defacing

Mod H-6 Distributed Denial-of-Service Attack

Mod H-7 Cyber War  Cyber war – actions by a nation- state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption  Maybe the next major attack on the U.S.  Some intrusions into critical systems have already taken place

Mod H-8 Players  Hackers – knowledgeable computer users who use their knowledge to invade other people’s computers  Thrill-seeker hackers – break into computer systems for entertainment  White-hat (ethical) hackers – computer security professionals who are hired by a company to uncover vulnerabilities in a network

Mod H-9 Players  Black hat hackers – cyber vandals. They’re the people who exploit or destroy information  Crackers – hackers for hire, the people who engage in electronic corporate espionage  Social engineering – acquiring information that you have no right to by means of deception

Mod H-10 Players  Hacktivists – politically motivated hackers who use the Internet to send a political message  Cyberterrorists – those who seek to cause harm to people or destroy critical systems or information

Mod H-11 Players  Script kiddies (or bunnies) – people who would like to be hackers but don’t have much technical expertise  Are often used by experienced hackers as shields

Mod H-12 DIGITAL FORENSICS  Digital forensics – the collection, authentication, preservation, and examination of electronic information for presentation in court  Two phases 1. Collecting, authenticating, and preserving electronic evidence 2. Analyzing the findings

Mod H-13 Phase 1: Preservation  If possible, hard disk is removed without turning computer on  Special forensics computer is used to ensure that nothing is written to drive  Forensic image copy – an exact copy or snapshot of all stored information

Mod H-14 Phase 2: Analysis  Interpretation of information uncovered  Recovered information must be put into context  Digital forensic software pinpoints the file’s location on the disk, its creator, the date it was created and many other features of the file

Mod H-15 Modern Digital Forensics Has Many Components